Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-11963

Publication date:
19/11/2025
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Saysis Computer Systems Trade Ltd. Co. StarCities allows Reflected XSS.This issue affects StarCities: before 1.1.61.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2024-8528

Publication date:
19/11/2025
Reflected XSS using a specific URL in Automated Logic WebCTRL and Carrier i-VU can allow delivery of malicious payload due to a specific GET parameter not being sanitized.
Severity CVSS v4.0: MEDIUM
Last modification:
19/11/2025

CVE-2025-0421

Publication date:
19/11/2025
Improper Restriction of Rendered UI Layers or Frames vulnerability in Shopside Software Technologies Inc. Shopside allows iFrame Overlay.This issue affects Shopside: through 05022025.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2024-8527

Publication date:
19/11/2025
Open Redirect in URL parameter in Automated Logic WebCTRL and Carrier i-Vu versions 6.0, 6.5, 7.0, 8.0, 8.5, 9.0 may allow attackers to exploit user sessions.
Severity CVSS v4.0: HIGH
Last modification:
19/11/2025

CVE-2025-12592

Publication date:
19/11/2025
Legacy Vivotek Device firmware uses default credetials for the root and user login accounts.
Severity CVSS v4.0: CRITICAL
Last modification:
19/11/2025

CVE-2025-10437

Publication date:
19/11/2025
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eksagate Electronic Engineering and Computer Industry Trade Inc. Webpack Management System allows SQL Injection.This issue affects Webpack Management System: through 20251119.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-13395

Publication date:
19/11/2025
A security flaw has been discovered in codehub666 94list up to 5831c8240e99a72b7d3508c79ef46ae4b96befe8. The impacted element is the function Login of the file /function.php. The manipulation results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.
Severity CVSS v4.0: MEDIUM
Last modification:
19/11/2025

CVE-2025-64408

Publication date:
19/11/2025
Apache Causeway faces Java deserialization vulnerabilities that allow remote code execution (RCE) through user-controllable URL parameters. These vulnerabilities affect all applications using Causeway&amp;#39;s ViewModel functionality and can be exploited by authenticated attackers to execute arbitrary code with application privileges. <br /> <br /> This issue affects all current versions.<br /> <br /> Users are recommended to upgrade to version 3.5.0, which fixes the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-12472

Publication date:
19/11/2025
An attacker with a Looker Developer role could manipulate a LookML project to exploit a race condition during Git directory deletion, leading to arbitrary command execution on the Looker instance.<br /> <br /> <br /> <br /> Looker-hosted and Self-hosted were found to be vulnerable.<br /> This issue has already been mitigated for Looker-hosted instances. No user action is required for these.<br /> <br /> <br /> Self-hosted instances must be upgraded as soon as possible. This vulnerability has been patched in all supported versions of Self-hosted.<br /> The versions below have all been updated to protect from this vulnerability. You can download these versions at the Looker download page https://download.looker.com/ :<br /> * 24.12.103+<br /> * 24.18.195+<br /> * 25.0.72+<br /> * 25.6.60+<br /> * 25.8.42+<br /> * 25.10.22+
Severity CVSS v4.0: HIGH
Last modification:
19/11/2025

CVE-2025-11230

Publication date:
19/11/2025
Inefficient algorithm complexity in mjson in HAProxy allows remote attackers to cause a denial of service via specially crafted JSON requests.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-58412

Publication date:
19/11/2025
A improper neutralization of script-related html tags in a web page (basic xss) vulnerability in Fortinet FortiADC 8.0.0, FortiADC 7.6.0 through 7.6.3, FortiADC 7.4 all versions, FortiADC 7.2 all versions may allow attacker to execute unauthorized code or commands via crafted URL.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-0351

Publication date:
19/11/2025
Rejected reason: Voluntarily withdrawn
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025